State of the art in information security policy development

H Paananen, M Lapke, M Siponen - Computers & Security, 2020 - Elsevier
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …

An analysis on the dimensions of information security culture concept: A review

A Nasir, RA Arshah, MR Ab Hamid, S Fahmy - Journal of Information …, 2019 - Elsevier
The cultivation of positive Information Security Culture (ISC) is an effective way to promote
security behavior and practices among employees in the organization. However, there is yet …

Defining organisational information security culture—Perspectives from academia and industry

A Da Veiga, LV Astakhova, A Botha, M Herselman - Computers & Security, 2020 - Elsevier
The ideal or strong information security culture can aid in minimising the threat of humans to
information protection and thereby aid in reducing data breaches or incidents in …

Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective

GPS Tejay, ZA Mohammed - Information & Management, 2023 - Elsevier
The continuous information security failures in organizations have led focus toward
organizational culture. It is argued that the development of culture of information security …

Peering through the lens of high‐reliability theory: A competencies driven security culture model of high‐reliability organisations

F Hassandoust, AC Johnston - Information Systems Journal, 2023 - Wiley Online Library
To improve organisational safety and enhance security efficiency, organisations seek to
establish a culture of security that provides a foundation for how employees should …

Human factors in information security culture: A literature review

HW Glaspie, W Karwowski - Advances in Human Factors in Cybersecurity …, 2018 - Springer
Abstract Information security programs are instituted by organizations to provide guidance to
their users who handle their data and systems. The main goal of these programs is to foster …

Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Government Information …, 2022 - Elsevier
Ensuring employees' compliance with information security controls is a major challenge
experienced by the management of information security in organisations. While the …

A review of information system integration in mergers and acquisitions

S Henningsson, PW Yetton… - Journal of information …, 2018 - journals.sagepub.com
For three decades, research has investigated the role of information systems integration (ISI)
in mergers and acquisitions (M&As). This research has improved our understanding of the …

Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors

G Dhillon, R Syed, F de Sá-Soares - Information & Management, 2017 - Elsevier
Managing information security in Information Technology (IT) outsourcing is important. We
conduct a Delphi Study to identify key information security concerns in IT outsourcing. A …

An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture

A Da Veiga - Information & Computer Security, 2018 - emerald.com
Purpose Employee behaviour is a continuous concern owing to the number of information
security incidents resulting from employee behaviour. The purpose of this paper is to …